A Secure Decentralized Cloud Computing Environment over Peer to Peer

Transcription

1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013, pg RESEARCH ARTICLE ISSN X A Secure Decentralized Cloud Computing Environment over Peer to Peer Tanupriya Choudhury 1, Vasudha Vashisht 2, Himanshu Srivastava 3 1 Assistant Professor in School of CS from Lingaya s University, India 2 Assistant Professor in School of CS from Lingaya s University, India 3 Undergraduate in computer science from G.B.T.U, India Abstract Cloud computing platform is a set of scalable large-scale data server clusters, it provide computing and storage services to customers. A cloud computing provider or cloud computing service provider owns and operates live cloud computing systems to deliver service to third parties. The barrier to entry is also significantly higher with capital expenditure required and billing and management creates some overhead. Nonetheless, significant operational efficiency and agility advantages can be realized, even by small organizations, and server consolidation and virtualization rollouts are already well underway. Cloud computing systems provide large-scale infrastructures for high-performance computing that are elastic since they are able to adapt to user and application needs. Cloud computing platform is a set of scalable large-scale data server clusters. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Research shows that the architecture of current cloud computing system is central structured one; all the data nodes must be indexed by a master server which may become bottle neck of the system. In this project, the proposed new cloud storage decentralized architecture (no centralization is there, that s why it s designed in Peer to peer) and designed a prototype system. The system based on the new architecture has better scalability and fault tolerance and proposed system designed a cloud based environment where request and response is taking place between client and chunk servers through Gateway. Anyone can take multiple chunk servers as well as multiple clients in the proposed system, this environment (client) can make request for deploying a web-service and also in this proposed system, it s implement the cross-technology platform using the cloud based environment and at last proposed an algorithm with the help of Advance Encryption Standard which is going to provide security in the form of encryption and decryption in the cloud based environment. Key Terms: - Cloud computing; fault tolerance; P2P; multi-agent systems; virtualization; encryption; cluster; server storage I. INTRODUCTION Existing System A. Google Computing System-GFS When a client wants to visit some data on a chunk server, it will first send a request to the Master. The master then replies with the corresponding chunk handle and locations of the replicas. The clients then send a request to one of the replicas and fetch the data wanted. The Cloud computing technology has been widely applied in e- business, e-education.cloud computing platform is a set of Scalable large-scale data server clusters, it provides 2013, IJCSMC All Rights Reserved 433

2 computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Research shows that the architecture of current Cloud Computing System is central structured one; all the data nodes must be indexed by a master server which may become bottle neck of the system. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted. On doing this the server cannot process the query from the user in a proper manner. So the processing time gets increased. It may leads to traffic and congestion. To overcome these problems we are going for the concept called cloud computing. In this cloud computing we are going to implement the chunk server to avoid these problems. Limitation 1- The design and maintenance of the system controlled by a central managed architecture. 2- The flaw of central index architecture is that the GFS master may become bottle neck of the system since all the request to the target data chunk must be originated from the index server which burdens the master. 3- Backup recovery very difficult Fig.1 Web service standards and their relations in SOA Proposed System B. P2P - Peer to Peer When a client makes a request the request goes to gateway. The gateway constructs a search request and sends the request to the chunk server P2P network. The P2P search request locates the nearest chunk server based on the memory usage and the request is processed by that chunk server. The client will upload, download and deploy the information from the nearest server (here nearest server means which server is containing the greater value of memory usage, that server will select as nearest server).and also I am going to Secure this cloud architecture using Advance encryption standard. I am going to put this architecture as a service oriented work such as using this we can deploy web services for cross technology(i.e.- Such as I have written a logic in Java, using this cloud service I can deploy the logic in.net platform also and run it there). Fig.2 Web service standards and their relations in chunk server 2013, IJCSMC All Rights Reserved 434

3 Advantages 1- Improved Reliability than the client-server cloud. 2- Much more cost effective because there is no need to build expensive datacenters. 3- Offers much needed Reliability and Security. 4- Provides pure distributed data storage environment without any central entity to offer infrastructure services. 5- Minimize the downtimes using P2P architecture. 6- It is a method of delivering computer network services in which the participants share a portion of their own resources, such as processing power, disk storage, network bandwidth, printing facilities. 7- Such resources are provided directly to other participants without intermediary network hosts or servers. Imagine yourself in the world where the users of the computer of today s internet world don t have to run, install or store their application or data on their own computers, imagine the world where every piece of your information or data would reside on the Cloud (Internet). As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing", the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud", including conventional outsourcing. Cloud computing comes into focus only when you think about what we always need: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends ICT's existing capabilities. Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging. II. CLOUD COMPUTING THE CONCEPT Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. The concept incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as Web 2.0 and other recent technology trends which have the common theme of reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include Salesforce.com and Google Apps which provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. The term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer network diagrams, and is an abstraction for the complex infrastructure it conceals. C. Types Public cloud Public cloud or external cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who shares resources and bills on a fine-grained utility computing basis. Private cloud Private cloud and internal cloud are neologisms that some vendors have recently used to describe offerings that emulate cloud computing on private networks. These products claim to "deliver some benefits of cloud computing without the pitfalls", capitalizing on data security, corporate governance, and reliability concerns. While an analyst predicted in 2008 that private cloud networks would be the future of corporate IT, there is some uncertainty whether they are a reality even within the same firm. Analysts also claim that within five years a "huge percentage" of small and medium enterprises will get most of their computing resources from external 2013, IJCSMC All Rights Reserved 435

4 cloud computing providers as they "will not have economies of scale to make it worth staying in the IT business" or be able to afford private clouds. The term has also been used in the logical rather than physical sense, for example in reference to platform as service offerings, though such offerings including Microsoft's Azure Services Platform are not available for onpremises deployment. Fig.3 Types of Cloud Computing Hybrid cloud A hybrid cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises". III. SYSTEM REQUIREMENT D..Selection of softwares & languages Technology J2EE (Jdk1.5, Servlet, Jsp), HTML Web Server Apache Tomcat 6.0 Database MYSQL Browser Internet Explorer 6.0 or above Platform Windows 2000, XP E. Selection of hardware Processor Intel Pentium IV processor Ram 512MB Hard disk 40GB Monitor 800 x 600 minimum screen resolutions Keyboard Microsoft standard 104 keys Mouse Microsoft basic optical mouse IV. SERVICE ORIENTED ARCHITECTURE (SOA) The concept of service oriented architecture or SOA deals with reducing the organizational expenses through optimizing resource management from human to other system resources in order to reduce organizational costs and increase the overall throughput and efficiency. The basic tenet of SOA is reusability of the organizational resources. In a service oriented architecture, a resource can be accessed at any time, by each authorized entity, from anywhere at the system. On the other hand, the dispersed independent services can communicate to each other to make new composites for new organizational businesses One of the important features of service oriented architecture is using a common language among the system nodes which introduces it as an appropriate approach for distributed heterogeneous environments. We implemented a basic version of our proposed algorithm through web services as one of the existing SOA implementation approaches with the following standards: SOAP Simple Object Access Protocol is a W3C standard defining protocols for passing objects using XML (Extensible Marked up Language). SOAP Runtime system enables a client to call methods on a SOAO-enabled service, passing objects in XML format. 2013, IJCSMC All Rights Reserved 436

5 WSDL Web Service Description Language is also a W3C standard which is used to describe a web service interface. Fig.4 Relation Between WSDL & UDDI UDDI Universal Description Discovery and Integration is a protocol for web based registries that contain information about web services such as the Location of its WSDL file. Web services today are frequently just Application Programming Interfaces (API) or web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. It prepares a distributed strategy for a comprehensive and dynamic stegenography process which improves reusability, facilitates system management, reduces complexity, and improves the overall security. Advantages 1. Distributed Computing Model. 2. Platform independency: Since services are communicating through common standards and all the request/responses are accomplished through XML, different platforms can collaborate to each other in a totally transparent environment. 3. All web services public agreements must be described by open and standard protocols such as SOAP (Simple Object Access Protocol) and HTTP. Compared with the general objects, they are more standardized and easier to understand by the machine. 4. Integration capabilities; web service technology adopts simple and easy-to-understand protocols to express its principal which is described by the WSDL (Web Service Description Language).So the technology fully shields the differences between different software platforms. 5. The concept of service oriented architecture or SOA deals with reducing the organizational expenses through optimizing resource management from human to other system resources in order to reduce organizational costs and increase the overall throughput and efficiency. 6. Our system can make use of all the existing possibilities regardless of their different hardware/software platforms, languages and so on. 7. New features can be added to the system as a new service without any other modifications. 8. Advantage of loose coupling; when the web services change, the callers will not feel them. As to the service requesters, as long as the service interfaces do not change, any changes of services will make no influence on the service requesters. 9. Making use of the underlying service oriented architecture, the proposed strategy not only supports the current algorithms, and it also provides an open architecture for the future algorithms. 10. Since the system is based on SOA and the concept is break down as independent (and sometimes general purpose) services, the overall reusability and flexibility would be quite high. 2013, IJCSMC All Rights Reserved 437

9 this.state[r,c] = temp[ r, (c + r) % Nb ]; VII. PROCESS DESIGN Module Description H. Client Module This is a user interface module that allows clients to access the cloud services. I. Login Module Fig.5 Cloud Computing For Developers (Demo) Fig.6 Cloud Computing For Developers (Demo Signin) This module ensures security by preventing unauthenticated users from getting access to cloud services. To authenticate user id and password are collected and the user credentials are validated against the database. If the user is a valid user he is authorized to access cloud services. If the user is found to be an invalid user an error message is reported and prevents the user from accessing the cloud services. 2013, IJCSMC All Rights Reserved 441

10 J. New Client Registration This module helps the users who wished to access cloud services to get registered. User details like name, id, password, address, city, country, company and other details are collected and validated and details are registered in the database. K. Cloud Services This module helps the clients to perform various operations provided by the cloud providers. Clients can perform operations like uploading, downloading and deployment and can see the report of operations that they have performed during various time periods. L. Upload Service Module Fig.7 Cloud Computing Web Services (Demo) Fig.8 Cloud Computing Uploading (Demo) This module provides room for the clients to upload their file. To upload a file a web page is designed which prompts the user to select a file using open dialog box. Once a file is chosen the file securely gets uploaded on a chunk server for later retrieval and log details like file uploaded, user id of the user and timestamp are recorded in database for user to track their uploads any time. M. Download Service Module This module helps the users to download their uploaded files. To download a file, a web page is designed which displays the user list of files so far he/she has uploaded and a download button to download. User can click on the download button of the file he/she is interested. On clicking the download button a save dialog box is shown which prompts the user to specify the location to save the file and file gets downloaded automatically at the user specified location. N. Deployment Service Module This module is used to deploy a WAR (Web Archive) file meant for web hosting. The deployment service module web page prompts the user to select a war file to deploy. The selected war file securely gets deployed in a chunk server and IP address of the chunk server at which deployment has taken place is displayed on screen to 2013, IJCSMC All Rights Reserved 442

11 access the web site. The date and time at which deployment has taken place, user id and deployed war file details are registered in the database for tracking. Fig.9 Cloud Computing Web Hosting (Demo) O. Upload and Deployment List This module helps the users to track their file uploads and war file deployments. Name of the uploaded/deployed file, date and time of the operations are displayed on the screen in a tabular format for easy tracking. P. Gateway Module This module forwards the client request to the nearest chunk server based on the memory usage. When a client makes a request the request is intercepted by the gateway. A gateway acts intermediates between requested client and chunk servers in P2P network. The gateway is periodically updated with list of chunk servers currently available in a network and also the amount of free memory currently available in each chunk server. Fig.10 Cloud Computing (Demo Gateway) So when a request comes gateway determines where to forward the client request (to which chunk server) based on the memory availability of chunk servers. So gateway forwards the request to chunk server that has maximum free memory. Information regarding lookup operation such as time taken by the gateway to do lookup operation is recorded in the database for analysis Q. Chunk Server module This module is used to implements data security for user uploads. R. Data Security - Encryption/Decryption module When a client upload his/her file the contents in the file are encrypted and then stored in chunk server thereby preventing anyone to see the actual content. When a user makes a request for download then the encrypted file contents are decrypted and original data is constructed and then gets downloaded. 2013, IJCSMC All Rights Reserved 443

12 Database Design S. Data Dictionary Database users and application developers can benefit from an authoritative data dictionary document that catalogs the organization, contents, and conventions of one or more databases. This typically includes the names and descriptions of various tables and fields in each database, plus additional details, like the type and length of each data element. There is no universal standard as to the level of detail in such a document, but it is primarily a distillation of metadata about database structure, not the data itself. A data dictionary document also may include further information describing how data elements are encoded. One of the advantages of well-designed data dictionary documentation is that it helps to establish consistency throughout a complex database, or across a large collection of federated databases. User details table Field Name Field Type Size Key Description Firstname Varchar 25 Firstname of the user Lastname varchar 25 Lastname of the user address Varchar 25 Primary Key Id of the user for login. Password varchar 25 Password to login Address1 varchar 75 User Address Line1 Address2 Varchar 77 User Address Line2 City Varchar 25 User Address City State Varchar 25 User Address Postalcode Country Varchar 25 User Address-Country Phoneno Varchar 11 User contact number Company name Varchar 100 Company in which user is working. Company url Varchar 100 URL of the company website. User Uploads table Field Field S Key Description Name Type ize Upload Id Int Primary key Unique Id to track each uploads. User Id varchar 25 Foreign Key references User Login Id of the user details table. Uploaded Date Datetime Date and time at which upload operation taken place. Uploaded varchar 100 File the user has uploaded File Chunk varchar 75 IP Address of the chunk server. server User deployments table Field Field S Key Description Name Type ize DeployId Int Primary key Unique Id to track each deployment. UserId varchar 25 Foreign Key references LoginId of the user Userdetails table. DeployedDate Datetime Date and time at which web application deployment has taken place. DeployedFile varchar 100 File the user has deployed. Chunkserver Varchar 75 IP address of the chunk server where web application has been deployed. Memory Usage table Field Name Field Size Key Description Type Memusage Int Amount of free memory currently available in a chunk server. Chunkserver varchar 75 IP Address of the chunkserver. Lookup delay table 2013, IJCSMC All Rights Reserved 444

13 Field Name Field Size K Description Type ey LookupTimestamp Datetime Date at which gateway has performed lookup operation. Delaytime Int Time taken by the gateway to complete the lookup operation. Chunkserver varchar 75 IP Address of the chunkserver. VIII. TABLE RELATIONSHIPS. Database normalization is the cornerstone of database theory. Once a database is normalized, relationships between the data in multiple tables must be established. Database relationships are associations between tables. There are three types of relationships: 1) One-to-one: Both tables can have only one record on either side of the relationship. Each primary key value relates to only one (or no) record in the related table. 2) One-to-many: The primary key table contains only one record that relates to none, one, or many records in the related table. Many-to-many: Each record in both tables can relate to any number of records (or no records) in the other table. Many-to-many relationships require a third table, known as an associate or linking table, because relational systems can't directly accommodate the relationship. IX. CONCLUSION Cloud computing is a recent trending in IT that moves computing and data away from desktop and portable PCs into large data centers. It refers to applications delivered as services over the Internet as well as to the actual cloud infrastructure namely, the hardware and systems software in data centers that provide these services. We propose a new architecture of cloud computing system based on P2P protocol, which resolve the problems of bottle neck come from central structure. A cloud computing platform dynamically provisions, configures, reconfigures, and provisions servers as needed. Our new architecture provides a different mean to 2013, IJCSMC All Rights Reserved 445

Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

Cloud Service Model Selecting a cloud service model Different cloud service models within the enterprise Single cloud provider AWS for IaaS Azure for PaaS Force fit all solutions into the cloud service

Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

CloudFTP: A free Storage Cloud ABSTRACT: The cloud computing is growing rapidly for it offers on-demand computing power and capacity. The power of cloud enables dynamic scalability of applications facing

Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of

Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

On a Journey to the Cloud or Lost in the Fog? Velimir Srića Banking is necessary but banks are not! Tom Peters Information is necessary but IT (as we know it) is not! My consulting experience ICT - Infrastructure

Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

IT Service Management aus der Cloud V05_10/1 www.solvedirect.com SolveDirect! " Who we are SolveDirect is the expert for smart service integration! " What we offer Cutting-edge solutions: easy and affordable

TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL *Hung-Ming Chen, Chuan-Chien Hou, and Tsung-Hsi Lin Department of Construction Engineering National Taiwan University

Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should

To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in ho2099@sib.co.in A monthly publication from South Indian Bank 20 th Year of Publication Experience

Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating